QV

Gespeichert in:
Bibliographische Detailangaben
Titel: QV
Weitere Verfasser: The Pennsylvania State University CiteSeerX Archives
Quelle: http://www.sans.org/reading-room/whitepapers/incident/computer-forensic-timeline-analysis-tapestry-33836/.
Bestand: CiteSeerX
Schlagwörter: WV
Beschreibung: This paper is from the SANS Institute Reading Room site. Reposting is not permitted without express written permission. Computer Forensic Timeline Analysis with Tapestry Computer forensics requires applying computer science to answer legal questions. Arranging events chronologically is a good way of telling a clear, concise story. As valuable as date-- and time--based information often is to a case, none of the leading forensic tools offer usable date and time oriented tools. Log2timeline is an excellent tool for extracting date and time based information from digital evidence. In fact, the amount of information it extracts can overwhelm the examiner. Most computer forensic timeline to.
Publikationsart: text
Sprache: English
Relation: http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.643.2988
Verfügbarkeit: http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.643.2988
http://www.sans.org/reading-room/whitepapers/incident/computer-forensic-timeline-analysis-tapestry-33836/
Rights: Metadata may be used without restrictions as long as the oai identifier remains attached to it.
Dokumentencode: edsbas.782A46E2
Datenbank: BASE
Beschreibung
Abstract:This paper is from the SANS Institute Reading Room site. Reposting is not permitted without express written permission. Computer Forensic Timeline Analysis with Tapestry Computer forensics requires applying computer science to answer legal questions. Arranging events chronologically is a good way of telling a clear, concise story. As valuable as date-- and time--based information often is to a case, none of the leading forensic tools offer usable date and time oriented tools. Log2timeline is an excellent tool for extracting date and time based information from digital evidence. In fact, the amount of information it extracts can overwhelm the examiner. Most computer forensic timeline to.